CVE-2022-23650 – github.com/gravitl/netmaker
Package
Manager: go
Name: github.com/gravitl/netmaker
Vulnerable Version: >=0 <0.8.5 || >=0.9.0 <0.9.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00593 pctl0.68311
Details
Use of Hard-coded Cryptographic Key in Netmaker ### Impact There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients. ### Patches This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. If you are running these versions, the fix is to perform the following: 1. docker-compose down 2. docker pull gravitl/netmaker:( version ) 3. docker-compose up -d #### Additional Information If you are running **any other version**, you will need to upgrade to one of these three versions. If you have a special circumstance that requires running a different version, let us know and we may be able to build a custom patch. ### For more information If you have any questions or comments about this advisory: * Email us at [info@gravitl.com](mailto:info@gravitl.com)
Metadata
Created: 2022-02-22T19:40:23Z
Modified: 2022-02-22T19:40:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-86f3-hf24-76q4/GHSA-86f3-hf24-76q4.json
CWE IDs: ["CWE-321", "CWE-798"]
Alternative ID: GHSA-86f3-hf24-76q4
Finding: F009
Auto approve: 1